Proceedings of the 7th Scientific Conference on Information Technologies for Intelligent Decision Making Support (ITIDS 2019) 2019
DOI: 10.2991/itids-19.2019.58
|View full text |Cite
|
Sign up to set email alerts
|

Semantic modeling of cyber threats in the energy sector using Dynamic Cognitive Maps and Bayesian Belief Network

Abstract: The article discusses the use of semantic modeling in the analysis of threats to energy security (ES). Semantic modeling is proposed to be applied at a qualitative level, followed by quantitative assessment of the ES level in studies of energy security. Exercise of traditional software systems provides a quantitative assessment, which is characterized by the duration of information preparation, and the formation and adjustment of large enough models for computational experiments. At the first level, a decision… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…One of these is Gaber et al [55] threat modelling methodology for joint-estimation detection of cyberattacks within the smart grid, using both Bayesian and Neyman-Pearson optimum test methods, expanding upon a previous research methodology by Tajer et al [42], with the advantages of checking the decision rules regarding the BN model providing absolute values. Another proposal is Gaskova and Massel [36] which applies dynamic cognitive maps alongside Bayesian networks for analysing cyber-threats to understand the relationships across the identified weights in respective time-scales. Expanding upon this by including DBN application after designing the cognitive maps could help maintain the flow of time throughout the system modelling and a more powerful metric transition.…”
Section: Mixed Bayesian Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…One of these is Gaber et al [55] threat modelling methodology for joint-estimation detection of cyberattacks within the smart grid, using both Bayesian and Neyman-Pearson optimum test methods, expanding upon a previous research methodology by Tajer et al [42], with the advantages of checking the decision rules regarding the BN model providing absolute values. Another proposal is Gaskova and Massel [36] which applies dynamic cognitive maps alongside Bayesian networks for analysing cyber-threats to understand the relationships across the identified weights in respective time-scales. Expanding upon this by including DBN application after designing the cognitive maps could help maintain the flow of time throughout the system modelling and a more powerful metric transition.…”
Section: Mixed Bayesian Methodologiesmentioning
confidence: 99%
“…They break down systems different from BN approaches and are structured much more different, such as Zografopoulos et al [2], Zhou et al [5], Caviglione and Coccoli [29], which demonstrate smart grids and other critical infrastructures different towards similar goals. These alternative options can be applied alongside a Bayesian-based approach to creating a new structured methodology to assist in understanding these systems and compensate and improve all aspects regarding the ToE [36]. Cyber threats are used corresponding within the model to test cyber-attacks on how the proposed framework could best understand the systems and walk through these attacks on how they influence the modelled nodes and values.…”
Section: Modelling Process and Structurementioning
confidence: 99%
“…A dynamic cognitive map differs from a regular cognitive map in that it is a bunch of cognitive maps that reflect the model at different points in time [11] (1):…”
Section: Dynamic Cognitive Mapsmentioning
confidence: 99%